Thursday 30 June 2011

Insane Demand Causes Google to Shut Down Invite Process for Google+

Google+Just a single day after Google unveiled Google+, the company's brand new social networking service, Google decided it would be a good idea to open up the invitation process late Wednesday afternoon to all those fortunate enough to have already been invited to participate in the service.

Before, the keys to Google+ were only given to those very select few who were fortunate enough to be allowed in at launch. So naturally an invite was a precious and prized commodity. Google has stressed that Google+ is in its very early stages though whatever it was that Google was aiming for with its field trial must have been pretty darn successful. The reason I say that is because every single person that was invited to the service is now able to invite other people in as well.

But that wasn't all, the people who were invited by the initial users were able to invite friends of their own too. Even better was the fact that people writing about the decision to open up the invitation process were suddenly struck with a lot of popularity amongst readers. MG Siegler from TechCrunch wrote on his Google+ page on his own story that, "I'm not sure any TechCrunch post has gotten comments at such a fast rate."

This amount of attention seems like it must have been a bit more than Google had asked for. After nearly six hours, Google shut the invitation process down over what Senior Vice President of Engineering at Google Vic Gundotra called "insane demand". Gundotra posted on his Google+ page late on Wednesday night, "We need to do this carefully and in a controlled way." Gundotra did not specify when the invite functionality would be back up and running.

Source: PC World - Google+ Invite Process Shut Down Amid 'Insane Demand'


The Security Camera Blog



Get a regular infusion of new security camera technology information, video and news. Easy to subscribe in a reader or by email.



We help you stay in touch with the latest security camera features.

Wednesday 29 June 2011

How-To Restore a Deleted Recycle Bin

My Recycle bin is GONE
My Recycle bin is GONE!
My Recycle Bin is GONE!


I accidentally deleted recycle bin!

Where is the recycle bin?  Its not on my DESKTOP!

My windows recycle bin is GONE!




I have done that myself, and don’t worry we will get it back!

Today’s How-To Guide for the Computer beginner is: how to restore recycle bin, because you might have deleted the recycle bin by accident!

 



image
Dumb Delete Option for Recycle Bin

Delete Recycle Bin


If you look at the picture you can see that right clicking on the recycle bin gives you an option to delete.

Don’t ask me why they came up with this bright idea, but they did. Confused smile

The first time I deleted the recycle bin I never even caught the ‘delete’ option that is pictured.  AFTER I was finished freaking out I had to learn How to recover the recycling bin.  How frustrating!

How-To Recover the Windows Recycle Bin

First thing we want to do is RIGHTclick on some available space on your desktop.   Then we need to click on ‘personalize’.

Right Click Personalize


The control panel will open on the personalization settings.  In the upper left hand corner you should see, ‘change desktop icons’ in the blue section.

Once you click Change Desktop Icons you are almost done!  You will see the option to restore that recycle bin very quickly.

As you can see there are a couple of different options for you right on TOP!  You can click to make an X in the box next to the word ‘recycle bin’. 
image

The X should be missing next to the recycle bin now, and placing the X in the box restores the recycle bin.    If you look towards the bottom of the desktop icon settings scene make sure your ‘allow themes to change desktop icons’ is checked if available.

Look to the bottom of this screen, and then click the button ‘apply’ button.  At times you do need to push ‘ok’ as well, and other times you don’t.

I notice at times screens may flicker for a minute, but look to see if your deleted recycle bin is back!  Flickering doesn’t always happen when we restore the recycle bin, but I wanted to mention it in case it did happened.

Now you don’t have to be like I was and freaking out, ‘Where is my recycle bin?  MY WINDOWS RECYCLE IS GONE!”

I hope our How-To Restore our Recycle bin lesson as helpful! 

If you have any questions or comments feel free to leave me a comment here.

Don’t forget to place your email address in the subscribe box so you can have more lessons sent your email when they come out!

Hope you come back for another How-To Guide for the Computer Beginner lesson!

 

Friday 24 June 2011

What is a USB Flash Drive?

what is a UBS flash drive
Picture of a common USB Flash Drive
Today’s lesson for the computer beginner is my attempt to explain the USB Flash drive.

What is a USB Flash Drive?  Its is a Data storage device that you can take with you!

USB stands for Universal Serial Bus.

When I was in college all we had to save our work on was a 5 1/4 inch floppy disk.  In time we had used a 3.5 inch floppy disk which were nicer.  Next came the CD Rom, and now we have the USB Flash Drive.

With each generation of storage devices that we have had they got more durable, had more storage space, and are easier to everyone to use.  USB Flash drives can come in all colors, spaces, and even sizes.

When you create a file on your computer?  It could be a letter, presentation, picture, etc you can save that on your hard drive. The hard drive, disk drive or in most cases is also called your C drive.  YES they can all mean the same thing.

How often do we hear people mention we need to ‘back up’ our files?  Today people can use the USB drive for that purpose, and many MANY others!

USB Flash Drives are smaller, faster, have thousands of times more capacity, and are more durable and reliable because of their lack of moving parts. 

Nothing moves mechanically in a flash drive; the term drive persists because computers read and write flash-drive data using the same system commands as for a mechanical disk drive (floppy disk, CD rom), with the storage appearing to the computer operating system as just another drive (Floppy or CD).

Plug your USB Flash into USB Port

If you look at the first picture of the USB Flash drive I used something should look familiar! 

USB Flash drives you would plug into your USB port on your computer. 

What do you use a flash drive or thumb drive for?



There are MANY uses, but I will give you some general ideas today.

The reason people like the USB flash drives or thumb drives is because they transfer your files faster, and have a larger capacity for storage.  I have read (have never used the USB flash drive this way) you can save information from game systems such as Xbox and Playstation on these.  Soon they say some mobile phones will have this capability.

What is neat about that?  Your children have their latest game setting saved on their Xbox, and you announce that you are going to a family event.  The kids can save their game settings on the USB flash drive, and bring it with them.  Once you get to the families house they plug in their information into the families Xbox, and now they can play with all their cousins!

If you keep your eyes open you tend to see these near almost every checkout in stores today. 

Here is a famous example of a USB Flash drive!

A recent familiar use of the flash drive or thumb drive was when they found Bin Laden this year.

When Osama Bin Laden was found and killed the news reports stated they found hundreds of ‘thumb drives’.  This is another name for them. 

It was reported that he did not have internet access, and yet we hear about him sending emails.  How is that possible? 

He wrote the emails on his computer, and saved them to his Flash Drive.  Someone took those flash drives to a location where internet access was possible.  They copied the emails into an email program, and they were sent off.  The emails he received from people were copied onto the flash drive (thumb drive), and brought back to him to read on his computer.

All his correspondence, files, plans and contacts were all saved for reference on thumb drives (flash drives).   Think about that for a minute!  If he knew they were coming to get him?  He would just grab his thumb drives when he left.  They would find his computer, but all his files were with him.  Its easier to take the flash drives compared to carrying around your computer when your are trying to escape! 

Bin Laden would NOT keep copies of his files on the computer directly EVER, but used his flash drives instead.  If they found his computer?  Big deal.  All the important stuff is with him.  Since they found the important stuff?  THAT is why they were excited!

I hope I helped explain to you what a USB flash drive is.  Keep in mind this is also called a thumb drive as well.  Bye for now from How-to Guide for Computer Beginners!

What is a URL?

what_is_a_URL

What is a URL?  That is a fancy way of saying the website address.

 

U is for Universal, R is for Resource, and  is for Locator.

 

What is a URL Address

 

Every page on the internet has its own unique URL address.   Today I’m creating a page named, “What is a URL?” 

We will go over the basics of ‘what is a URL’ is first, and then I will explain what I mean by each page as its own different address.

Most websites start with:  http://            as part of the URL address.   This is called the protocol

 

‘http’ stands for HyperText Transfer Protocol

You would just pronounce it ‘http’ (just the letters – not my quote marks)

The ‘://” part is pronounced: dot dot backslash backslash

 

so together they would be pronounced with letters separately, and then use the words:

 

h

t

t

p

dot

dot

backslash

backslash

 

Most of the time websites start with this protocol.   That is the reason most people do not mention the http:// part when they tell you the website address.  The web browser normally types that automatically for you, so you don’t even have to type it either.

 

If the website HAS a different protocol?  That is when they will mention it to you.  ‘fttp://” would be an example of that.

 

WWW

www.  

is the next part of the URL address, and it stands for world wide web.

 

When you hear people say ‘dot’ they are speaking of the period that you see at the end of the ‘www’.

 

So www. is pronounced:

w

w

w

dot

The next part of the URL is called the:

 

Domain Name

The first thing to keep in mind with domain names in the URL is they tend not to be case sensitive.  In other words, don’t worry about what needs to be capitalized and what is lower case.

 

URL addresses do not use spaces either.  So if someone told you that their website URL is “what is a URL” they assume you realize NOT to use spaces.  In other words, ‘ w w w dot whatisaurl dot com’.  You notice I used NO spaces!

 

whatisaurl is the domain name! 

.COM

.com is called a top level domain.

its is pronounced:

dot

com

 

Remember the periods are referred to as ‘dot’.  Below are examples of other top level domains you may have heard of.

 

  • com - commercial websites or generic
  • .edu - post secondary educational institutions
  • .net - network oriented sites or generic
  • .org - noncommercial community
  • .mil - United States military

    .gov - United States government

     

    Each page on the internet has its own address

     

    Now that I explained, ‘what is a URL’ lets move to what I was talking about when I said each PAGE on the internet has its own address!

     

    I will try to keep this simple, and keep in mind each page’s address may not look JUST like my example.  Its will hopefully give you an idea of what I’m trying to get across with the different URL addresses.

     

    what is a url example


    For this example lets use a layout of our homes. 

    Our domain name may be 123 main street (your address). 

    In the picture of our URL house above we have different rooms we all recognize. 

     

    So our main domain name would be pronounced: w w w dot 123mainstreet dot com

     

    what is a URL different address

     

    Next URL page will have an article called, ‘bedroom’. 

     

    Then you decide you wanted to keep to category of ‘bedroom’ and speak about the bedroom lamp.  Notice the second URL address difference:  bedroom/lamp 

     

    My next URL address change is when I moved into the bathroom as my second category.  The next article we are staying in the bathroom, but use the URL bathtub to speak about bathtubs.

     

    You can do this for every room in the house, and every item for as long as you wish.

     

    Each time a new page is added to the website – it is given a new URL address.  Make sense?

     

    If you have any further questions about ‘what is a URL’ just write me a note, and I will try to help you!

     

    I hope you enjoyed this How-To basic lesson for the computer beginner that covered what is a URL.

     

     

  • Tuesday 21 June 2011

    Setting Up New Computer–Assembly Your Computer

    rear panel of computerNow that we have found our, ‘Location, Location, Location’ for our computer its time to unpack everything.  Getting excited yet?

    Lets move to the next step of setting up our new computer.  Unpacking our new computer!

    One thing I have noticed it seems ever since the Tylenol  scare is unpacking of anything is nothing less than frustrating!  When you first setup your computer?  You have tons its seems like to unpack.  Take your time and put on your patience hat!

    Computers have come a long way from the past, but you still want to be sure that food and drinks are not in places that are going to spill during the setup of the computer.

    What I have done in the past is keep all the boxes and packing material for a while, in case something is wrong and needs to be returned.  I normally keep the biggest box in tact, and just dump everything else inside of it.  All the boxes, bags, packing material.

    I normally pick up computers that I purchase, but if you had it shipped?  If it was extremely cold outside you may wish to wait until the computer warms up before powering it on for the first time.  We don’t want any condensation.

    Find an area on the floor to spread everything out while unpacking, and that also helps from dropping items.  I have done that myself!

    We don’t know how the manufacturers have packed the boxes, so avoid cuttingunpacking computer setup into it.  Pealing the tape may take longer, but you are less likely to cut into a cable or scratch part of the computer.  Heck that even helps in case something is wrong with the computer once you take it out, and have a good box to return it in.

    The CPU and the monitor at times are hard to get out of the boxes.  Don’t flip it upside down, and pull the box off.  Tip it on the side, and drag it out that way onto your floor.

    I normally grab one of those oversized envelopes at this point.  You are going to come across a mound of paperwork during the setup of your new computer.  I write the computer’s name and model on the outside of the envelope, and place all the paperwork as I come to it inside the envelope.

    You should come across your warranty forms as well.  I have noticed within the years computer’s give you the option of filling out your warranty online, but if prefer filled it out when you find it.  I would do this right away, because it may save you tons of money later on when you need the service. I would keep your receipts, etc in there as well.

    OEM Software serial numberIn the past software would come separately, but that may not always be the case anymore.  Your operating system (for example) today seems to have a label from Microsoft on the side of your CPU or tower.

    They call this the OEM software, and the product key is something you may wish to copy down, or take a picture of so you can see the serial number.  This is something I also place in the envelope with all the rest of the paperwork.

    Nothing is worse if you have to call your computer manufacturer for something,Product ID label for computer and they ask for your computer’s serial number, or product ID number.  Normally on the computer’s rear panel (backside) you will find this label.   When my computer is setup the way I like it?  The last thing I want to do is figure out HOW to get to the rear panel to read this information to someone over the phone.

    I found this picture online.  The model number is 9900, but the system number, support ID, serial number you may need as well.  I would again either write this information down, or what I have done is also take a picture of it. 

    Keep these labels in tact on your unit, and make sure if you take pictures you can read those numbers clearly.

    If you have found your packing slip yet make sure everyone is in the box that is listed.  If not, contact your store or computer manufacturer right away!   The cables are normally stored separately.  They can be in a box, or bag, at times they place them inside items.  It seems to me they normally place cables towards the bottom of the box.  They also seem to tape items to the Styrofoam, inside manuals or paperwork.  At times you need to be Sherlock Holmes to find it all.

    connector pins setup of computer
    Check the cables and the connectors.  One example of connectors is pictured here.  Cables should not have cuts in them, and the connectors should have all pins intact.  The pins can easily snap off, or bend at times.  I would call the manufacturer if you find this to be the case.  They may just ask you to straighten it out, but make note of whom you spoke to and when.  If it breaks?  That would be on them – not you!

    Remove all packing from the computer and the parts.  Look in every hole, vent, etc.  They seem to get carried away with all the packaging, and it needs to be removed.

    I realize setting up a new computer at this point can seem like a daunting task, but at this point you are almost HOME!  Next time, we will speak about the rear panel of your computer.  We will be ‘hooking it up’ as the saying goes.  This is the most exciting part of setting up your new computer!  At this point you have found your location, and unpacked everything.  Hooking it up means you are almost ready to turn your computer on, and have SOME fun!

    Setting Up New Computer – Pick a Location

    rear panel of computer_thumbWhen my novice friends get a new computer I normally get a phone call to come, and help them set the new computer up.  

    Setting up computers at first can be very intimating it seems with all the different parts, wires, etc. 

    I want to go over some important parts, before we rip open that box and get down to business with setting up the computer.

    I will try to break this down in a couple of articles of setting up the computer.

    The first important step of setting up your new computer?

    LOCATION! LOCATION! LOCATION!

    Yes you guess it!  We need to think about WHERE we are going to place our computer.

    Don’t invest in a new computer if you are going to place it in a damp room, on a wobbling card table where it very unstable.  Damp or dusty rooms can lower the life expectancy of your computer.   Placing it on unstable furniture you take the risk of the table collapsing, or the computer falling off.

    Location for your computer setup is also important when you think about HOW you are going to use the computer, and when.  Its suppose to be fun, so don’t sit it in the corner of the basement to get it out of the way.    If you have children or grandchildren I recommend placing it in a living area so you can supervise what they are doing on it.

    Magnetic fields are NOT a computer’s friend!  Microwaves, magnets themselves and some appliances do have a magnetic field.  It can damage your data on your computer.

    You need to be sure you have grounded outlet source for electricity.  Don’t use the same one your energy hog major appliances use.  Power fluctuations can also damage your computer, and destroy your files. 

    Another portion of your initial set up of your computer is to find out where your connection for the internet is coming into.  If you are going to use dial up you will need to use a phone jack.  Most people actually have a phone jack under the computer, and they install it separately.  If you have a internet provider?  They will normally connect the cable connection, and you will need to ask tglare on computer monitor, setup new computer_thumbhem to place it near your computer’s location.

    Keep in mind some monitors may have some glare issues if your monitor is directly facing the light source.  That could be a window, or something else.  Glare will make it very difficult for you to see your screen. 

    As I’m sure you noticed your computer has fans in the rear computer panel.  It also may have vents as well.  YES, your computer will need to breath so it doesn’t overheat. 

    Basically, you are looking for a clean, dry, cool, and out of direct sunlight place for your setup of the new computer.

    The last portion of this lesson on setting up your new computer surge protector_thumbto invest in a decent surge suppressor. It is also referred to a surge protector.

    I normally use this surge protector for monitors, printers, and scanner, etc as well.  As you can see from the picture it has more than one outlet.

    Most computer manufacturers will not cover damage to your computer if you don’t use one.

    Decent surge suppressors also offer a warranty that covers damage to your computer and the surge protector as well.  Most of them now days also have a phone jack, or Ethernet slot.

    With the new televisions and entertainment equipment?  I have a surge protector for all of it.

    So, step one is setting up our computer HAS to be location!  Next, lets unpack those boxes!


    Setting Up New Computer–Ports, Wires, Cables OH MY!

    rear panel of computer

    Welcome Back to setting up a new computer!

     

    So far we have spoke about the location of our new computer, and unpacking of our new computer.

     

    The picture is what is called the rear computer panel.  Keep in mind not all rear computer panels look the same, but generally they will all have similar parts that will be referred to as connectors, ports.

     

    Some computers may have all the ports and connectors on the rear panel of their computer as pictured, and some not have as many ports and connectors.  That’s fine!

     

    When we are done YOU will be able to impress all your friends with your computer rear panel knowledge!  How does that sound?back panel ports and connectors

     

    For Safety reasons, I do need to stress its ALWAYS a good idea to completely shut off your computer, and unplug it from its electrical source.  We don’t want to get electric shocks or worse!  You also will take the chance of damaging your computer as well, but personally?  I think you are more important. 

    Keep in mind that connectors have male and female counterparts. The male has the pins while the female has the holes.

     

    At this point we have NOTHING plugged in to the electrical outlet!  It comes last!  If you have anything plugged in?  Unplug it!

     

    As I’m sure you have guessed already the tower can be called, CPU, tower, system unit.  This is the brains of the computer. 

     

    Peripheral Devices

    Peripheral Devices are items we will plug into the CPU, Tower or system unit.  Some examples of peripheral devices is the keyboard and mouse.  Your monitor is almost like a TV screen, and you are reading these directions through a monitor.  The speakers add sound, and of course our printer.

     

    Scanners, joysticks, cameras, modem, etc are all peripheral devices.

     

    Static Buildup

     

    In our last lesson I mentioned that magnetics fields are NOT a computer’s friend.  Today I wanted to mention neither is Static Buildup. 

     

    Do you remember as kids you dragged your feet along the carpet, and then touched your sibling to shock them?  That can kill sensitive components of a computer.   Most recommend placing the unit on a anti-static pad to prevent this.

     

    I have to admit I’m bad at this.  Normally, before handling anything?  I touch something besides the computer parts.  That releases the shock, and I move on.  Carpeted areas are the worse for the shock and static.  Others use anti static wrist pads, etc. 

     

    Setting up your new computer: Plug in those connections!

    Note:  Today’s technology tends to use what they call ‘wireless’ connection.  It is exactly what it sounds like.  There is no wires to plug into the CPU at all.  Its amazing to watch once you turn on your computer that these Peripheral Devices connect automatically.  Depending on your operating system peripheral software may or may not be needed.  Normally, they will include it just in case.  Your first clue will be if it NOT working after you boot up the computer, or the computer asks for the software.  The newer computers normally will search out, and install the software on its own.  These Peripheral Devices normally work on batteries:  keyboard or mouse.  Check your batteries to make sure they work if your computer isn’t responding.

     

    Second Note: USB ports seem to be more popular to use for keyboards and mice.  I will cover USB ports as well, but wanted to note this in case your computer isn’t using the traditional PS/2 port for those peripheral devices.  (Don’t worry you will know what USB and PS/2 are soon!)

     

    What is nice about computer’s today is that the manufacturers got smart, and started put pictures next to the connections.  In the picture below you can see the green area that shows a mouse.

     

    PS/2 Port

     

     

    Pictured above is a PS/2 port on the back of your computer.  This is the female connector that has holes. Notice the outside shape isn't a true circle, but has almost notch looking curves. PS/2 connectors PS/2 Ports are normally used for the keyboard or mouse.

     

    At times you will have check to see if you lined up the outside shape I mentioned above when you push them into the back of your computer. Green cord goes into the green connector, as does the purple goes in the purple.  The cords would be the male connection!

     

    These should slide in easily.  Don’t force them, because you can break it.

     

    USB Port

     

    USB

    The UBS port that looks rather flat, and has that solid white portion on top. The cable you use is flat has well, and UBS normally just snap right in.

     

    The USB ports don’t normally have anything labeled like they do above.  You just grab a USB port that is available. 

     

    It seems to me technology is moving towards using more USB ports.  You may have these on the front panel of the computer, rear panel of the computer, or both.

     

    UBS ports are normally connected to items like: mouse, keyboard, speakers, printers, joysticks, headphones, etc.

     

    I normally place mouse, keyboard, speakers, printers plugged into the back of my computer.  On the front of my computer?  I have our headphones and camera.  We don’t use those all the time, and when we do use them we plug them in.  Its an easier access to the ports for me.  If they aren’t using them?  They are in the drawer.

     

    Ethernet

     

    The Ethernet reminds me of an oversized phone cord plug. You know how you plug your phone cord into the jack?  

     

    If you have dial up you maethernety not use this.  

     

    This normally is a connection that is used for high speed internet like DSL or cable.

     

    One end would plug into the rear panel of the computer where pictured.

     

    The other end of the cord would plug into your router or modem that your internet provider gave you – or had you buy.

    ethernet cord

     

     

     

     

    The cords with the oversized phone connector plug (ethernet) is normally pretty thick and normally colored blue.

     

     

    If you are using dial up internet connection?  Please see two websites for insight.  Dialup Modem one, Dialup Modem Two

     

     

    Serial Ports – These it seems are being phrased out.

     

    These are serial poParallel computer printer portrts. As you can see you will have to have a cord that is a female version. You also have to screws on the edge.   Its for a more secure fit. 

     

     

    Serial ports and Parallel Ports are similar, and to be honest seems to me are being phased out.  They are being replaced by USB, or PS/2 ports

     

     

    This is a Parallel computer or what some call a printer port.  This would be a good example of a male port.

     

     

     

     

     

     

     

     

    Some printer ports have a connectors may look this for this.

    printer port

     

     

     

     

     

     

     

    These ports are normally your very LONG ones! 

     

    This is the VGA port or video port, and is normally used for your monitor.

     

     

     

     

     

     

     

     

    Audio Jacks

    computer ports

     

    The above is all the jacks we have dealt with so far, but the ones on the bottom called audio jacks.  As you can see these are normally colored coded to make it easy.  These jacks directly connect to your computer's sound card or sound processor.

     

    These can be used for your speakers, microphone or headset, or music players for example.  We use them for the headset, because our family computer is in the living room.  We don’t need to hear youtube, or games playing while watching television! 

     

    Most desktop computers have at least one line-in jack to connect a music player or other audio device and one line-out jack to connect speakers. These jacks typically appear on the back of a desktop computer. Many desktop computers also have a microphone jack, which is often on the front of the computer.

     

    audio jacks

     

    Power Port or Power Plug

    power port

     

    This is the main electrical source plug from the back of your computer into your surge protector.

     

    All the ports and connections aren’t that hard.  Just need to find the spot that basically look like they go together pretty much.  I know my children took scraps of paper, and wrote ‘printer’ or ‘monitor’ or what have you on each plug or cable and taped them on the cords or cables as they figured them out.

     

    Remember to plug all your electrical plugs into your surge suppressor, and then plug that into your grounded outlet.  Remind those from lesson 2?

     

    According to most manufacturers that I have seen they ask you to turn on the monitor first, printer, speakers, etc – last but NOT least turn on your CPU or tower.  During this portion of your computer setup it may take a while for it to bootup as they call it. 

     

    You may also get some startup questions and instructions.  If some screens rush through before you can read them?  Don’t worry to much about it.  If they needed your input they would stop until you answered the question. 

     

    Well until next time this part of our step three of setting up your computer or setting your PC is complete. 

     

    Monday 20 June 2011

    Japan Creates World's Fastest Supercomputer

    Japan K ComputerWhen it comes to the most powerful supercomputers in the world, I don't think it is to anybody's great surprise that the most powerful one is located in Japan. This new Japanese supercomputer has just recently earned the top spot among all the supercomputers in the world with a performance that makes other supercomputers look like a TI-82.

    Known as the "K Computer", this device is three times faster than its closest rival from China, which previously held the number one spot, according to Professor of Electrical Engineering and Computer Science at the University Tennessee at Knoxville Jack Dongarra. Dongarra also keeps the official rankings of computer performance.

    The K Computer, which was created by Fujitsu and is located at the Riken Advanced Institute for Computational Science in Kobe, Japan, represents an incredible step forward in the realm of speed. This computer will also, more than likely, become a great sense of national pride for Japan, especially for computer scientists, who take the race to have the fastest computer in the world very seriously.

    According to Dongarra, "It's a very impressive machine. It's a lot more powerful than the other computers." The latest ranking of the top 500 computers is determined with a simple mathematical equation. The computer who gets to take the top spot is able to make 8.2 quadrillion calculations per second which also calculates to 8.2 petaflops per second. The performance of the K Computer is the same as linking around 1 million desktops.

    Supercomputers have many uses including earthquake simulations, climate modeling, nuclear research and weapons development and testing. Businesses also use supercomputers for oil exploration as well as rapid stock trading. However, building a supercomputer isn't cheap and it usually involves connecting thousands of small computers in a data center.

    The K Computer is made up of 672 cabinets filled with system boards. The K Computer is considered to be energy-efficient even though it uses enough electricity to power around 10,000 homes at an estimated cost of $10 million annually. I'd hate to see the statistics for the non-energy-efficient ones. The lab that the K Computer calls home is planning on increasing the size of the computer to 800 cabinets which is predicted to raise the speed of the supercomputer that is already faster then its five closest competitors.

    The K Computer received its name from the Japanese word "Kei" which translates to 10 quadrillion, the overall goal for the number of calculations the supercomputer should be able to perform. The previously leading supercomputer was China's Tianhe-1A which was located at the National Supercomputing Center in Tianjin, China. The Tianhe-1A was the first Chinese supercomputer to hit the top spot which acted as a beacon of the country's growing technological prowess.

    The fastest supercomputer in the United States is located at the Oak Ridge National Laboratory in Oak Ridge, Tennessee. It placed third behind the K Computer and the Tianhe-1A. Countries in Asia have made sizable investments in supercomputing and currently dominate the upper echelon of the field. Japan and China alone hold four out of the top five spots.

    However, when it comes to the top 10, the United States is still the leader, holding five of the top 10 spots. Japan's top supercomputer ranking marks the country's first since 2004. The United States and China were previously the only countries to hold that title. These rankings, issued every six months, are frequently changed and reflect just how fast computer power is advancing.

    Source: The New York Times - Japanese 'K' Computer Is Ranked Most Powerful

    Power Point Projectors
    Most business class projectors will do a good job displaying your PowerPoint presentation. If you have a small presentation group, a 2000 lumen LCD projector will be able to produce a nice and clear picture. For larger audiences you should consider a 5000 lumen LCD projector.

    Friday 17 June 2011

    Facebook Creating an App for the iPad

    Facebook iPad AppFacebook is planning on releasing an app for the iPad in the next couple of weeks that is said to feature a "slick design" as well as new Facebook Chat and Groups functionality. In addition to that, the app is also said to feature an "amazing" photo and video experience.

    This news comes right after another report that Facebook was preparing an HTML 5 web app for iOS devices. In addition to that, Facebook is supposedly working on a new website optimized for the iPad. However, Facebook's refreshed site is only meant to be a "supplement" to the iOS apps from Facebook, not a replacement.

    With the high popularity of the iPhone's Facebook app, it is surprising that Facebook hasn't created one for the iPad. To make up for the lack of an app, iPad users have been forced to turn to third party apps like Friendly, MyPad and Facely HD or just go with Facebook's actual website.

    However, that could all change if the latest round of rumors turns out to be true. It has been said that the proposed iPad app has been in development for over a year. It has been said that CEO of Facebook Mark Zuckerberg is heavily involved in the design of the app as well as its features. Photos and videos will be displayed full size at full resolution and the app is also expected to be free, just like all of Facebook's mobile apps.

    Source: PC Mag - Facebook Crafts an iPad App


    Put your eye on the problem with Camera Security Now, installing security cameras since 1999. We install in the US and we can help you do it yourself.



    Call us toll free 877-422-1907 between 8am EST and 5pm PST M-F. Talk to an expert about your serious security camera needs.

    Thursday 9 June 2011

    Samsung's New 30nm DDR3 DRAM

    Samsung has just recently introduced 30-nanometer-class1 DDR3 synchronous dynamic random access memory (DRAM) modules designed for upgrading your PC. This new generation of faster, energy efficient DRAM modules is going to be available via consumer retail channels this summer.

    According to Samsung Electronics America's Senior Vice President of Mobile Entertainment Marketing Reid Sullivan, "Replacing your DRAM can be one of the easiest, most cost-effective ways to upgrade your PC's performance, and these new products offer the most energy-efficient option currently available to consumers. Samsung is committed to bringing performance-enhanced computing to consumers, and our 30nm-class process technology offers an outstanding combination of advanced low-power DDR3 technology, with blazing speed up to 1,600 megabytes per second."

    You can get this new DRAM from Samsung in either a 2GB or 4GB model and both are available in very low profile unbuffered dual in-line memory module configurations for desktop PCs and small outline DIMM configurations for notebook PCs. They are also backwards compatible with systems designed for previous DDR3 and DDR2 memory and can be purchased in single or dual pack quantities.

    These memory sticks are also more energy efficient, using up to two-thirds less energy than those manufactured with industry standard 60nm class technology. What is great about that is that this boost in energy efficiency does not come at the cost of performance. The new modules transfer data at up to 1,600 Mbps which is 20% faster than the current 40nm-class generation of DDR3 DRAM from Samsung.

    The new 30nm-class DDR3 DRAM modules will be available from Samsung this summer with single pack modules costing less than $30 to less than $55 and dual pack modules ranging from less than $55 to less than $110.

    Source: Engadget - Samsung's 30nm DDR3 DRAM boosts speeds, cuts power consumption

    Saturday 4 June 2011

    Internet Access Shut Down In Most of Syria


    According to Renesys, a service that focuses on monitoring Internet connectivity, due to the civil unrest that is going on in Syria, most of the country’s Internet services have been shut down.

    According to a blog post that was posted by Renesys on Friday, June 3 at approximately 6:35 a.m. local time, close to two-thirds of the entire country’s networks were disabled. The company said that “over the course of roughly half an hour, the routes to 40 of 59 networks were withdrawn from the global routing table."

    Unfortunately for Syrians, most of their Internet access is brought to them by a company called SyriaTel, which is state-owned. "They buy most of their Internet transit from Turk Telekom and Deutsche Telekom, with some contribution from PCCW, Tata, and Telecom Italia," Renesys said. "Connectivity has historically come in over submarine cable from Cyprus; activation of new terrestrial fiber connections to Turkey have been delayed by this year's political unrest."

    Well, what about the other third of the networks, some might ask? Unfortunately, Renesys said that all of those connections belong to the Syrian government. Of course the country’s Oil Ministry Web site is still online, as is Syrian Telecom’s official page, but government sites like the Ministry of Education, the Damascus city government page and the Syrian Customs site are all down.

    Although Renesys had lots of great information, they did not have any evidence of what specific regions or cities were affected by the outages or how the massive outage was coordinated; however, they did say that "if Egypt and Libya's Internet outages are any guide, one might conclude that events on the streets in Syria are reaching a tipping point."

    Google confirmed the outages in Syria via its Twitter account, tweeting on Friday afternoon: "Google services currently blocked in Syria."

    For months the citizens of Syria of have been protesting against the conditions of their country, but according the Washington Post, the real turning point for everything was this past Wednesday. The Post reports that more than 300 opponents of the current Syrian president, Bashar al-Assad, held a meeting at a hotel in Turkey to discuss what their next move should be. According to the Post, "It was significant that the government's opponents were finally coming together to try to present a united front to a world that remains skeptical about the Syrian protest movement."

    Just this past February, there were reports that the Syrian government was planning to lift the then current bans on YouTube and Facebook. These bans had been present for over four years and were supposed to be lifted due to the “popular upheaval” about the situation.

    In the past year, there has been plenty of civil unrest around the globe. Protest and violence exploded in the Middle East in Egypt, Libya, Yemen and Syria. In January Internet services went down in Egypt for a couple days, due to the protests concerning the country’s governmental issues, including the nearly 30-year rule of its “President” Hosni Mubarak. In March Internet services were also disabled in Libya due to similar issues and protests.

    The outages in Syria, however, ironically occurred on the same day that the United Nations released its Special Rapporteur on Freedom of Expression. Frank La Rue’s report discussed the recent increase of governmental restriction on the flow of online information. He noted that this was mostly due to the Internet’s ability to unite individuals together in protest of something; however, in his report he encouraged governments to not restrict their country’s citizens' Web usage. He instead asked them to work on developing a plan that would make the Internet widely available, accessible and affordable to all.

    "There should be as little restriction as possible to the flow of information via the Internet, except in a few, very exceptional, and limited circumstances prescribed by international human rights law," La Rue said in a statement.

    "The report by the Special Rapporteur raises concerns about justifying broad surveillance powers under the name of national security or counter-terrorism," said the U.S.-based Electronic Frontier Foundation in a statement. "La Rue should be commended for questioning the ostensible motives for online surveillance."

    "As Rapporteur La Rue affirms, the Internet's unique ability to provide ample space for individual free expression can lead to the strengthening of other human rights, including political, economic and social rights," said Cynthia Wong, the Director of the Center for Democracy and Technology’s Project on Global Internet Freedom. "In order for these rights to be realized, governments, civil society and industry must all continue to build on the work begun by the Special Rapporteur."



    Computers, Desktops, Laptops, Servers and the latest in Portable Tablet PCs are available from your computer rental company, Rentacomputer.com.

    Talk to a Rentacomputer.com Tech Travel Agent Today!
    Call Toll free 800-736-8772.

    Friday 3 June 2011

    Malware on the Rise


    Malware is the thing to look out for these days. McAfee claims that they tracked more than six million different unique malware samples in the first quarter alone. Those numbers make the first quarter the most active quarter for malware issues ever.

    In a statement, Vincent Weafer, the senior vice president of McAfee Labs, said, "It's been a busy start to 2011 for cybercriminals."

    McAfee went on to say that February was the most active malware month. In February, 2011 there were 2.75 million samples alone. According to the company, in March, 2011 there were also more than 350,000 fake anti-virus software samples, which was the highest level in over a year; however, partially in part to the demise of the Rustock botnet, spam is at the lowest level since 2007.

    "Even though this past quarter once again showed that spam has slowed, it doesn't mean that cybercriminals aren't actively pursuing alternate avenues," Weafer continued. "We're seeing a lot of emerging threats, such as Android malware and new botnets attempting to take over where Rustock left off, that will have a significant impact on the activity we see quarter after quarter."

    The most popular OS for mobile malware is still Symbian, but McAfee reported that Android is gaining on Symbian and came in at number two. McAfee thinks that Android isn’t number one because Google allows for the side-loading of Android apps. This means that it does not have a main spot where it checks apps for any possible suspicious behavior.

    Just this past week, Google had to remove more than two dozen apps from their Android Market due to malware issues. NetQuin, a mobile security firm, also identified more than 20 malware filled Android apps that went to the extent of auto-dialing phones to pile up high user fees.

    When dealing with spam, McAfee tracked more than 1.5 trillion messages each and every day, but thankfully that number is less than half of what it was just a year ago.

    Government agencies across the globe have been working hard to crack down on cybercrime. In September dozens of international cyber-gangsters who were responsible for the creation and spread of the Zeus botnet were arrested. Also, thanks to Microsoft, FireEye (an anti-malware company), the University of Washington and Pfizer (a pharmaceutical firm) Rustock was taken down in March.

    In their statement McAfee warned that the creators of the Zeus bot are hard at work merging the Zeus code with the SpyEye botnet. This would affect banking and online transactions, so it could cause some major issues if it isn’t handled.

    "There was a strong uptick in new botnet infections toward the end of Q1, most likely due to the reseeding process, where cybercriminals slow down activity in order to spend time rebuilding botnets," McAfee said. "The botnet takedowns have resulted in an increase in the price of sending spam on the underground marketplace, showing that the laws of supply and demand also apply to cybercrime."

    So why are people even falling for these threats? Well, cyber-criminals are very sophisticated these days. They make their scams look legit, so it’s hard to tell that it’s a threat sometimes until it’s too late. It seems that the spam that is promoting an actual product seemed to lure in the most people. IGNORE the e-mails advertising iPads and HDTVs. McAfee also noted a rise in “banker” Trojans. They lure people in talking about things like UPS, FedEx, USPS and the IRS. Unfortunately, on top of that, scammers are also taking advantage of crisis events like the Japan earthquake and tsunamis.

    It’s just important to pay attention to what you are opening up or downloading before you do it. If you’re careful and take the necessary precautions, you should most likely be able to avoid any issues.


    Rack-Mount Server rentals are ideal if your company needs an extra storage unit for company information while you are testing various types of storage solutions.

    Whether you need a short-term rental or a long-term lease, we have the right kind of server for your needs.

    Thursday 2 June 2011

    Fake MacDefender Malware Originating from Russian Payment Processor


    For about a month there has been a fake MacDefender malware that has been circulating and plaguing Apple computer owners. No one seemed to know where it was coming from, but finally on Friday, May 27 a computer security researcher made the claim that the fake malware could be traced back to an online Russian payment processor called ChronoPay.

    "Some of the recent scams that used bogus security alerts in a bid to frighten Mac users into purchasing worthless security software appear to have been the brainchild of ChronoPay, Russia's largest online payment processor and something of a pioneer in the rogue anti-virus business," wrote security researcher Brian Krebs on his KrebsonSecurity blog.

    The fake MacDefender and the incredibly similar scareware called MacProtector and MacSecurity tended to attack from points like infected Google Image search results. Once your computer is infected, it is incredibly difficult for Mac users to remove the malware. The issue is that the malware doesn’t have a dock icon and it attaches itself to the launch menu of the computer.

    Krebs was able to trace the newest strains of the scareware back to ChronoPay by simply examining the two different domains that the software directs all of its Mac users to go to for a paid software security solution. While investigating, he found out that both mac-defence.com and macbookprotection.com were associated with the e-mail address fc@mail-eye.com. According to leaked ChronoPay documents, this e-mail address is owned by Alexandra Volkova, the company’s financial controller.

    According to Krebs, both of the Mac domains listed above have been suspended by Webpoint.com, which is a Czech registrar; however, Krebs said that the fc@mail-eye.com account was used recently to register appledefense.com and appleprodefense.com. Despite this, Mac users have not yet reported being directed to either of these sites via malware like MacDefender.

    "ChronoPay has been an unabashed 'leader' in the scareware industry for quite some time," Krebs writes. Just in 2008, it was the core processor of a site called trafficconvertor.biz. This was an “anti-virus” program that was designed to release the first strain of the Conficker worm. It was an incredibly destructive virus that still works to infect millions of computers across the globe.

    "In the coming days, Apple will deliver a Mac OS X software update that will automatically find and remove MacDefender malware and its known variants," Apple wrote. “The update will also help protect users by providing an explicit warning if they download this malware."

    Apple also released a document with detailed instructions for Mac users on ways to eliminate MacDefender from their computers.



    Find out what is going on in the Tech Army World.



    What are the Top 10 Money Making Missions?

    What other companies have joined and what do they do?

    How do I join the
    Tech Army Organization ?

    Wednesday 1 June 2011

    Dell Computers Are a Green Choice


    In today’s society, many are encouraged to ‘go green’ and help save our planet’s resources. These days our society is focusing on reusing, reducing, and recycling materials. Dell computers are a great choice for those who want to become more eco-friendly. There are many different things about Dell computers that qualify them as ‘green’.



    One thing that qualifies Dell computers is what they’re made of. The company consistently finds new ways to incorporate recycled materials into their products, as well as less harmful materials. Much of the plastic used to make Dell computers is recycled material, as well as the plastic used in their packaging. They have also replaced many of the harmful chemicals used to produce their computers with less harmful and/or harmless materials. One major step they took was introducing more computers with LCD screens which reduce the usage of mercury.



    Another great thing about Dell computers is the packaging that they come in. Besides using recycled plastic, Dell also uses bamboo when packaging their computers. The bamboo is biodegradable and is a natural, renewable resource. Bamboo also has a lot of tensile strength, which makes it ideal for packaging and protecting the computers.



    Not only are the products that Dell creates eco-friendly, but also the way in which their products are manufactured. The company is one of the top five purchasers of renewable energy in the U.S. and is number one when it comes to the computer industry. Dell also strives to reduce their water usage. Many Dell facilities have installed more efficient water fixtures, as well as re-using water for landscaping irrigation after it is treated by on-site sewage treatment facilities. Dell also does not create any industrial wastewater.



    Outside of creating and shipping their products, Dell is also eco-friendly in the fact that they have set up a partnership with Goodwill which encourages people to donate their old computer equipment, no matter what brand, in order to help people in economic crises. To find a drop-off center near you, click here. Dell has also partnered with The Conservation Fund and Carbonfund.org to help the Plant a Tree Program. This program uses donations to plant trees in areas that have been deforested in order to offset greenhouse gas emissions. If you would like to make a donation, you can do so here.



    It’s clear that when it comes to going green, Dell has a lot to offer. They strive to continue making their company more energy efficient and eco-friendly in every way possible. To learn more about how Dell is making a difference in the environment, visit http://content.dell.com/us/en/corp/dell-earth.aspx.




    Find out what is going on in the Tech Army World.



    What are the Top 10 Money Making Missions?

    What other companies have joined and what do they do?

    How do I join the
    Tech Army Organization ?